Vulnerability Management Process
May 12, 2010New Assets, Technologies, Patches, Configurations Discovered Tracked by: Spreadsheets Asset Inventory System New Vulnerabilities and Threats Discovered Validated by: Alerts Web Site Research Information Collected and Validated Remediation: Database Spreadsheet Validation Tests Correlate Vulnerabilities to Assets Deployment Validated by: Risk Analysis Tools Develop Critical Vulnerability and Threat Risk-Ranked List...
Tags: Compliances (1300), Documentation (800), Security (1500)